INSIGHT: When Breaking Bad ransomware, don’t fall prey
There are various ways that hackers make money...
There are various ways that hackers make money...
“Talk about a meta sort of attack,” says Casper Manes, consultant, GFI Software, reacting to a phishing attack which used “Dropbox to spoof Dropbox.”
With Facebook’s recent announcement that they will allow video ads to automatically play in news feeds, three things are clear.
"A common theme across all of these is clear... Is that cloud services are being compromised."
Nobody wants to be the Internet Police....
In case you have been practising the Luddite lifestyle, participating in an experiment simulating life on Mars, here’s a news flash for you.
While MacGyver relied heavily on his brains and his ingenuity, he didn’t fashion solutions out of thin air - there was always something close at hand that he could use to solve the problem.
In how many ways can one of your network's hosts become compromised?
While most IT security focuses on technology, network connectivity, firewalls, antivirus, and patching, you cannot overlook the importance of physical security.
Users love to have Internet access, and most of the time that's not a bad thing...